SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Diocese of Wilmington Catholic Schools
Acceptable Use of Technology Agreement
Access to technology is integral to the educational mission and purpose of our institution. These policies
address the appropriate use of technology provided by the school and personally owned technological
devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the
Catholic Schools Office Acceptable Use of Technology: Student Edition.

    •   We expect our students to act responsibly and thoughtfully when using technology.

    •   Students should not expect that what they write or publish online is private. The school reserves the
        right to monitor and track all behaviors and interactions that take place online or through the use
        of technology on our property or at our events.

    •   The use of all school-owned technologies including the school network and its Internet connection
        is limited to educational purposes.

    •   Commercial and recreational use of school technology resources is prohibited.

    •   Recreational use of the school technology is prohibited.

    •   All emails sent from school provided accounts are representative of the school.

    •   Connection to wireless Internet by students is prohibited unless otherwise directed/instructed.

    •   Students are responsible for any activity that occurs through their personal account.

    •   Students must respect the privacy of others.
            o Do not intentionally seek information on, obtain copies of, or modify files, other data, or
                passwords belonging to others.
            o Do not misrepresent or assume the identity of others.
            o Do not re-post information that was sent to you privately without the permission of the
                person who sent you the information.
            o Do not post private information about another person.
            o Do not post photos or videos of others without prior permission.
            o Do not use another person’s account. If you have been given an account with special
                privileges, do not use that account outside of the terms with which you were given access
                to that account.

    •   Do not voluntarily post private information about yourself online, including your name, your age,
        your school name, your address, your phone number, or other identifying information.

    •   Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s
        name, logo, mascot or other likeness or representation on a non-school website without express
        permission from legitimate authority.

    •   Students may not initiate electronic communication with teachers, adult leaders in ministry, or
        administrators.

    •   Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed
        by emergency or parish/school personnel.

    •   Never use devices capable of capturing, transmitting, or storing images or recordings to record
        others without the expressed permission of the person(s) being recorded (including adult leaders
        and other young people). Such recording devices may never be accessed, turned on or operated
        in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable
        expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and
        inspect any PTD in accord with written policies.
•   Social networking websites, profiles, or accounts, may not be accessed through the school’s
        technology at any time. Students may not create social networking pages, accounts, sites, or
        groups that impersonate or misrepresent any individual.

    •   Students may not access material that is offensive, profane, or obscene including pornography
        and hate literature.

    •   Inappropriate communication is prohibited in any public messages, private messages, and
        material posted online by students.

    •   Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or
        annoy any individual.

    •   Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods,
        MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video
        game systems onto school property or to school events.

    •   International websites may only be accessed from school owned technology under the direction
        of legitimate authority.

    •   All students are expected to maintain academic honesty.

    •   All access to the Internet is filtered and monitored.

    •   Unless legitimate authority grants explicit permission, students are not allowed to alter, change,
        modify, repair, or reconfigure settings on school-owned computers. This includes downloading,
        adding, or installing new programs, software, or hardware.

    •   If you accidentally access inappropriate information or if someone sends you inappropriate
        information, you should immediately tell a staff member or teacher.

    •   If you witness someone else either deliberately or accidentally access inappropriate information or
        use technology in a way that violates this policy, you must report the incident as soon as possible.

    •   The school retains the right to suspend service, accounts, and access to data, including student
        files and any other stored data.

    •   The school is not responsible for any damages students may suffer, including but not limited to, loss
        of data or interruptions of service.

My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined
in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies
is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we
understand and agree that his/her access privileges may be revoked and discipline action and/or legal
action may be taken.

Signature of Parent/Guardian                                          Date




Signature of Student                                                  Date

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (8)

Math requirements2012
Math requirements2012Math requirements2012
Math requirements2012
 
О факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН РоссииО факультете внебюджетной подготовки СЮИ ФСИН России
О факультете внебюджетной подготовки СЮИ ФСИН России
 
Civil warsoldierletter8th
Civil warsoldierletter8thCivil warsoldierletter8th
Civil warsoldierletter8th
 
Guidelines for Holocaust Paper
Guidelines for Holocaust PaperGuidelines for Holocaust Paper
Guidelines for Holocaust Paper
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Milk difference
Milk differenceMilk difference
Milk difference
 
Library curricula 2011 arranged by grade
Library curricula 2011 arranged by gradeLibrary curricula 2011 arranged by grade
Library curricula 2011 arranged by grade
 

Ähnlich wie Acceptable Use Agreement Students 2011

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Matthew Rathbun
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxJPAballe
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyKoolteechatechnology
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentationCarl Hooker
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010Barb Jansen
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditTamir Harper
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICYDebbie Oliver
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 

Ähnlich wie Acceptable Use Agreement Students 2011 (20)

Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptxSocial Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
Social Media Policy and Cellphone Policy of Holy Cross Academy Inc.pptx
 
Social media policy
Social media policySocial media policy
Social media policy
 
Arlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use PolicyArlington Classics Academy - Acceptable Use Policy
Arlington Classics Academy - Acceptable Use Policy
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Responsible use presentation
Responsible use presentationResponsible use presentation
Responsible use presentation
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010St. Andrew's Acceptable Use Policy 2010
St. Andrew's Acceptable Use Policy 2010
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
StudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEditStudentAcceptableUsePolicySDPEdit
StudentAcceptableUsePolicySDPEdit
 
ICT Acceptable Use POLICY
ICT Acceptable Use POLICYICT Acceptable Use POLICY
ICT Acceptable Use POLICY
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 

Mehr von St. Mary Magdalen School (18)

Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Adding and subtracting matrices
Adding and subtracting matricesAdding and subtracting matrices
Adding and subtracting matrices
 
Wikispaces for the classroom 2
Wikispaces for the classroom 2Wikispaces for the classroom 2
Wikispaces for the classroom 2
 
Collaborative documents
Collaborative documentsCollaborative documents
Collaborative documents
 
Flipping the classroom
Flipping the classroomFlipping the classroom
Flipping the classroom
 
Dickens and alcott webquest
Dickens and alcott webquestDickens and alcott webquest
Dickens and alcott webquest
 
Invisible web
Invisible webInvisible web
Invisible web
 
Wikispaces for the classroom
Wikispaces for the classroomWikispaces for the classroom
Wikispaces for the classroom
 
Banned books2010
Banned books2010Banned books2010
Banned books2010
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
Library intro7th
Library intro7thLibrary intro7th
Library intro7th
 
Library intro8th
Library intro8thLibrary intro8th
Library intro8th
 
8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric8th Gr. Holocaust Paper Rubric
8th Gr. Holocaust Paper Rubric
 
Dickens And Alcott Webquest
Dickens And Alcott WebquestDickens And Alcott Webquest
Dickens And Alcott Webquest
 
Directions For Performing Linear Regression
Directions For  Performing  Linear  RegressionDirections For  Performing  Linear  Regression
Directions For Performing Linear Regression
 
Directions For Performing Linear Regression
Directions For Performing Linear RegressionDirections For Performing Linear Regression
Directions For Performing Linear Regression
 
History Questions[1]
History Questions[1]History Questions[1]
History Questions[1]
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Kürzlich hochgeladen

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Kürzlich hochgeladen (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Acceptable Use Agreement Students 2011

  • 1. Diocese of Wilmington Catholic Schools Acceptable Use of Technology Agreement Access to technology is integral to the educational mission and purpose of our institution. These policies address the appropriate use of technology provided by the school and personally owned technological devices. This Technology Agreement is an abbreviation of full policies. For full policies, please refer to the Catholic Schools Office Acceptable Use of Technology: Student Edition. • We expect our students to act responsibly and thoughtfully when using technology. • Students should not expect that what they write or publish online is private. The school reserves the right to monitor and track all behaviors and interactions that take place online or through the use of technology on our property or at our events. • The use of all school-owned technologies including the school network and its Internet connection is limited to educational purposes. • Commercial and recreational use of school technology resources is prohibited. • Recreational use of the school technology is prohibited. • All emails sent from school provided accounts are representative of the school. • Connection to wireless Internet by students is prohibited unless otherwise directed/instructed. • Students are responsible for any activity that occurs through their personal account. • Students must respect the privacy of others. o Do not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to others. o Do not misrepresent or assume the identity of others. o Do not re-post information that was sent to you privately without the permission of the person who sent you the information. o Do not post private information about another person. o Do not post photos or videos of others without prior permission. o Do not use another person’s account. If you have been given an account with special privileges, do not use that account outside of the terms with which you were given access to that account. • Do not voluntarily post private information about yourself online, including your name, your age, your school name, your address, your phone number, or other identifying information. • Our institution prides itself on its reputation for excellence; therefore, you may not use the school’s name, logo, mascot or other likeness or representation on a non-school website without express permission from legitimate authority. • Students may not initiate electronic communication with teachers, adult leaders in ministry, or administrators. • Personal Technology Devices (PTDs) are for use only during an actual lock down and as instructed by emergency or parish/school personnel. • Never use devices capable of capturing, transmitting, or storing images or recordings to record others without the expressed permission of the person(s) being recorded (including adult leaders and other young people). Such recording devices may never be accessed, turned on or operated in restrooms, sleeping areas, dressing rooms, or other areas where there is a reasonable expectation of privacy. Teachers or school personnel reserve the right to confiscate, collect, and inspect any PTD in accord with written policies.
  • 2. Social networking websites, profiles, or accounts, may not be accessed through the school’s technology at any time. Students may not create social networking pages, accounts, sites, or groups that impersonate or misrepresent any individual. • Students may not access material that is offensive, profane, or obscene including pornography and hate literature. • Inappropriate communication is prohibited in any public messages, private messages, and material posted online by students. • Students may not utilize any technology to harass, demean, humiliate, intimidate, embarrass, or annoy any individual. • Unless explicit permission is granted by legitimate authority, students are not allowed to bring iPods, MP3 players, CD players, DVD players, or other similar data-accessing devices, or personal video game systems onto school property or to school events. • International websites may only be accessed from school owned technology under the direction of legitimate authority. • All students are expected to maintain academic honesty. • All access to the Internet is filtered and monitored. • Unless legitimate authority grants explicit permission, students are not allowed to alter, change, modify, repair, or reconfigure settings on school-owned computers. This includes downloading, adding, or installing new programs, software, or hardware. • If you accidentally access inappropriate information or if someone sends you inappropriate information, you should immediately tell a staff member or teacher. • If you witness someone else either deliberately or accidentally access inappropriate information or use technology in a way that violates this policy, you must report the incident as soon as possible. • The school retains the right to suspend service, accounts, and access to data, including student files and any other stored data. • The school is not responsible for any damages students may suffer, including but not limited to, loss of data or interruptions of service. My child and I have read, understand, and he/she will follow all rules, regulations, and policies as outlined in the Acceptable Use of Technology Policy. I/my child further understands that any violation of the policies is unethical and may constitute a criminal offense. Should I/my child commit any violation of the policy, we understand and agree that his/her access privileges may be revoked and discipline action and/or legal action may be taken. Signature of Parent/Guardian Date Signature of Student Date